Information security and ethics concepts, methodologies, tools and applications /

"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Nemati, Hamid R., 1958-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008.
Series:Contemporary research in information science and technology.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 03551nam a2200745 a 4500
001 29619
003 IGIG
005 20101120132449.0
006 m e d
007 cr bn||||m|||a
008 101115s2008 paua fsb 000 0 eng d
010 # # |z 2007031962 
020 # # |a 9781599049380 (ebook) 
020 # # |a 1599049384 (ebook) 
020 # # |z 9781599049373 (hardcover) 
020 # # |z 1599049376 (hardcover) 
024 7 # |a 10.4018/978-1-59904-937-3  |2 doi 
035 # # |a (CaBNVSL)gtp00544754 
035 # # |a (OCoLC)430970939 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b I54152 2008e 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Information security and ethics  |b concepts, methodologies, tools and applications /  |c Hamid Nemati, [editor].  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2008. 
300 # # |a electronic texts (lxxvi, 4037 p. : ill.) :  |b digital files. 
490 1 # |a Contemporary research in information science and technology 
500 # # |a "Premier reference source"--Cover. 
504 # # |a Includes bibliographical references. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed Nov. 15, 2010). 
650 # 0 |a Computer security. 
650 # 0 |a Information technology  |x Security measures. 
650 # 0 |a Information technology  |x Moral and ethical aspects. 
653 # # |a Codes of ethics in virtual communities 
653 # # |a Designing secure data warehouses 
653 # # |a Digital watermarking for multimedia security management 
653 # # |a E-business systems security for intelligent enterprise 
653 # # |a E-government and denial of service attacks 
653 # # |a E-health security and privacy 
653 # # |a Electronic banking and information assurance issues 
653 # # |a Enforcing privacy on the Semantic Web 
653 # # |a Ethical dilemmas in online research 
653 # # |a Ethical issues 
653 # # |a Ethics of digital government 
653 # # |a Information security management 
653 # # |a Integrating security and software engineering 
653 # # |a Multimedia security and digital rights management technology 
653 # # |a Privacy and confidentiality issues in data mining 
653 # # |a Privacy and security in E-Learning 
653 # # |a Privacy and trust in agent-supported distributed learning 
653 # # |a Privacy-preserving data mining 
653 # # |a Security and privacy in distance education 
653 # # |a Security and trust in mobile multimedia 
653 # # |a Security in service-oriented architecture 
653 # # |a Trust and security in ambient intelligence 
700 1 # |a Nemati, Hamid R.,  |d 1958- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2007031962 
776 0 8 |i Print version:  |w (DLC) 2007031962  |z 9781599049373  |z 1599049376 
830 # 0 |a Contemporary research in information science and technology. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3  |z View fulltext via EzAccess